Difference between revisions of "Anomaly Detection"
Line 15: | Line 15: | ||
* [[Capabilities]] | * [[Capabilities]] | ||
* [[Defenses Against Adversarial Examples for Deep Neural Networks]] | * [[Defenses Against Adversarial Examples for Deep Neural Networks]] | ||
+ | * [http://arxiv.org/abs/1906.03821 Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang] | ||
______________________________________________________ | ______________________________________________________ | ||
Revision as of 20:00, 4 September 2019
Youtube search... ...Google search
- Cybersecurity
- ...find outliers
- Government Services
- Capabilities
- Defenses Against Adversarial Examples for Deep Neural Networks
- Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang
______________________________________________________
Principal Component Analysis (PCA) Anomaly Detection
PCA-based anomaly detection - the vast majority of the data falls into a stereotypical distribution; points deviating dramatically from that distribution are suspect Keep it Simple : Machine Learning & Algorithms for Big Boys | Dinesh Chandrasekar